/external/chromium_org/third_party/openssl/openssl/crypto/rsa/ |
rsa_sign.c | 73 X509_SIG sig; local 102 sig.algor= &algor; 103 sig.algor->algorithm=OBJ_nid2obj(type); 104 if (sig.algor->algorithm == NULL) 109 if (sig.algor->algorithm->length == 0) 116 sig.algor->parameter= ¶meter; 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 122 i=i2d_X509_SIG(&sig,NULL) 162 X509_SIG *sig=NULL; local [all...] |
/external/dhcpcd/ |
signals.c | 52 signal_handler(int sig) 56 if (write(signal_pipe[1], &sig, sizeof(sig)) != sizeof(sig)) 57 syslog(LOG_ERR, "failed to write signal %d: %m", sig); 68 int sig = -1; local 74 if (bytes >= 0 && (size_t)bytes >= sizeof(sig)) 75 memcpy(&sig, buf, sizeof(sig)); 76 return sig; [all...] |
/external/mesa3d/src/gallium/state_trackers/d3d1x/gd3d11/ |
d3d11_misc.h | 55 dxbc_chunk_signature* sig = dxbc_find_signature(shader_bytecode, bytecode_length, DXBC_FIND_INPUT_SIGNATURE); local 56 if(!sig) 59 return dxbc_assemble_as_blob((dxbc_chunk_header**)&sig, 1, signature_blob); 68 dxbc_chunk_signature* sig = dxbc_find_signature(shader_bytecode, bytecode_length, DXBC_FIND_OUTPUT_SIGNATURE); local 69 if(!sig) 72 return dxbc_assemble_as_blob((dxbc_chunk_header**)&sig, 1, signature_blob);
|
/external/openssl/crypto/rsa/ |
rsa_sign.c | 73 X509_SIG sig; local 102 sig.algor= &algor; 103 sig.algor->algorithm=OBJ_nid2obj(type); 104 if (sig.algor->algorithm == NULL) 109 if (sig.algor->algorithm->length == 0) 116 sig.algor->parameter= ¶meter; 118 sig.digest= &digest; 119 sig.digest->data=(unsigned char *)m; /* TMP UGLY CAST */ 120 sig.digest->length=m_len; 122 i=i2d_X509_SIG(&sig,NULL) 162 X509_SIG *sig=NULL; local [all...] |
/external/tcpdump/ |
signature.c | 126 u_int8_t sig[16]; local 140 strlen(sigsecret), sig); 142 if (memcmp(rcvsig, sig, sizeof(sig)) == 0) { 147 for (i = 0; i < sizeof(sig); ++i) { 148 (void)printf("%02x", sig[i]);
|
/external/valgrind/main/coregrind/m_gdbserver/ |
signals.c | 208 const char *target_signal_to_name (enum target_signal sig) 210 if ((sig >= TARGET_SIGNAL_FIRST) && (sig <= TARGET_SIGNAL_LAST) 211 && signals[sig].name != NULL) 212 return signals[sig].name; 222 enum target_signal sig; local 230 for (sig = TARGET_SIGNAL_HUP; 231 sig < TARGET_SIGNAL_LAST; 232 sig = (enum target_signal) ((int) sig + 1) [all...] |
/external/smack/src/org/xbill/DNS/ |
DNSSEC.java | 113 digestSIG(DNSOutput out, SIGBase sig) { 114 out.writeU16(sig.getTypeCovered()); 115 out.writeU8(sig.getAlgorithm()); 116 out.writeU8(sig.getLabels()); 117 out.writeU32(sig.getOrigTTL()); 118 out.writeU32(sig.getExpire().getTime() / 1000); 119 out.writeU32(sig.getTimeSigned().getTime() / 1000); 120 out.writeU16(sig.getFootprint()); 121 sig.getSigner().toWireCanonical(out); 126 * SIG record and the RRsets to be signed/verified. This does not perfor 226 private SIGBase sig; field in class:DNSSEC.KeyMismatchException 946 SIGRecord sig = new SIGRecord(Name.root, DClass.ANY, 0, 0, local [all...] |
SIG0.java | 9 * Creates SIG(0) transaction signatures. 18 * The default validity period for outgoing SIG(0) signed messages. 27 * Sign a message with SIG(0). The DNS key and private key must refer to the 32 * @param previous If this message is a response, the SIG(0) from the query 47 SIGRecord sig = DNSSEC.signMessage(message, previous, key, privkey, local 50 message.addRecord(sig, Section.ADDITIONAL); 54 * Verify a message using SIG(0). 57 * necessary since SIG(0) signs the message in wire format, and we can't 60 * @param previous If this message is a response, the SIG(0) from the query 66 SIGRecord sig = null local [all...] |
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 38 Signature sig = Signature.getInstance("SHA1withDSA"); local 49 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 54 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/operator/jcajce/ |
JcaContentVerifierProviderBuilder.java | 89 Signature sig = helper.createSignature(algorithm); local 91 sig.initVerify(certificate.getPublicKey()); 93 stream = new SignatureOutputStream(sig); 159 Signature sig = helper.createSignature(algorithm); 161 sig.initVerify(publicKey); 163 return new SignatureOutputStream(sig); 260 private Signature sig; 262 SignatureOutputStream(Signature sig) 264 this.sig = sig; [all...] |
/external/chromium_org/third_party/mesa/src/src/glsl/ |
ir_function.cpp | 143 ir_function_signature *const sig = local 146 switch (parameter_lists_match(& sig->parameters, actual_parameters)) { 149 return sig; 152 match = sig; 209 ir_function_signature *const sig = local 212 if (parameter_lists_match_exact(&sig->parameters, actual_parameters)) 213 return sig;
|
lower_output_reads.cpp | 131 ir_function_signature *sig = (ir_function_signature *) closure; local 132 sig->body.push_tail(copy(sig, (ir_variable *) key, (ir_variable *) data)); 143 output_read_remover::visit_leave(ir_function_signature *sig) 145 if (strcmp(sig->function_name(), "main") != 0) 148 hash_table_call_foreach(replacements, emit_main_copy, sig);
|
/external/libpng/contrib/gregbook/ |
readpng.c | 86 /* return value = 0 for success, 1 for bad sig, 2 for bad IHDR, 4 for no mem */ 90 uch sig[8]; local 96 fread(sig, 1, 8, infile); 97 if (png_sig_cmp(sig, 0, 8))
|
/external/mesa3d/src/glsl/ |
ir_function.cpp | 143 ir_function_signature *const sig = local 146 switch (parameter_lists_match(& sig->parameters, actual_parameters)) { 149 return sig; 152 match = sig; 209 ir_function_signature *const sig = local 212 if (parameter_lists_match_exact(&sig->parameters, actual_parameters)) 213 return sig;
|
lower_output_reads.cpp | 131 ir_function_signature *sig = (ir_function_signature *) closure; local 132 sig->body.push_tail(copy(sig, (ir_variable *) key, (ir_variable *) data)); 143 output_read_remover::visit_leave(ir_function_signature *sig) 145 if (strcmp(sig->function_name(), "main") != 0) 148 hash_table_call_foreach(replacements, emit_main_copy, sig);
|
/external/qemu/util/ |
compatfd.c | 38 int sig; local 41 err = sigwait(&info->mask, &sig); 53 buffer.ssi_signo = sig;
|
/external/valgrind/main/none/tests/mips32/ |
SignalException.c | 13 int sig; member in struct:test 21 static int testsig(int sig, int want) 23 if (sig != want) { 24 fprintf(stderr, " FAIL: expected signal %d, not %d\n", want, sig); 39 static void handler(int sig, siginfo_t *si, void *uc) 43 ok = ok && testsig(sig, curr_test->sig); 88 #define T(n, sig, code) { test##n, sig, code }
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
SignedObjectTest.java | 51 Signature sig = Signature.getInstance("SHA1withDSA"); local 62 SignedObject so = new SignedObject(prop, tkp.getPrivate(), sig); 67 assertTrue("verify() failed", so.verify(tkp.getPublic(), sig));
|
Signature2Test.java | 191 Signature sig = Signature.getInstance("DSA"); local 193 sig.getParameters(); 214 Signature sig = Signature.getInstance("DSA"); local 217 sig.getParameter("r"); 218 sig.getParameter("s"); 246 Signature sig = Signature.getInstance("DSA"); local 247 sig.initSign(getDsaKeys().getPrivate(), new SecureRandom()); 253 Signature sig = Signature.getInstance("DSA"); local 254 sig.initSign(getRsaKeys().getPrivate(), new SecureRandom()); 306 Signature sig = Signature.getInstance("DSA") local 323 Signature sig = Signature.getInstance("DSA"); local 340 Signature sig = Signature.getInstance("DSA"); local 358 Signature sig = Signature.getInstance("DSA"); local 376 Signature sig = Signature.getInstance("DSA"); local 409 Signature sig = Signature.getInstance("DSA"); local 420 Signature sig = Signature.getInstance("DSA"); local 438 Signature sig = Signature.getInstance("DSA"); local 459 Signature sig = Signature.getInstance("DSA"); local [all...] |
SignatureTest.java | 122 Signature sig = getTestSignature(); local 123 sig.initVerify((PublicKey)null); 142 Signature sig = getTestSignature(); local 143 sig.initVerify(new MyCertificate()); 197 Signature sig = getTestSignature(); local 198 sig.initSign(null, null); 354 Signature sig = getTestSignature(); local 355 sig.update((byte) 42); 383 Signature sig = getTestSignature(); local 384 sig.update(b) 391 Signature sig = getTestSignature(); local 478 Signature sig = getTestSignature(); local 500 Signature sig = getTestSignature(); local [all...] |
/system/core/toolbox/upstream-netbsd/bin/kill/ |
kill.c | 188 signame_to_signum(char *sig) 192 if (strncasecmp(sig, "sig", 3) == 0) 193 sig += 3; 195 if (!strcasecmp(sys_signame[n], sig)) 214 int sig; local 225 for (len = 0, sig = 1; sig < NSIG; sig++) { 226 name = sys_signame[sig]; [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jce/netscape/ |
NetscapeCertRequest.java | 208 Signature sig = Signature.getInstance(sigAlg.getObjectId().getId(), local 210 sig.initVerify(pubkey); 211 sig.update(content.getBytes()); 213 return sig.verify(sigBits); 228 Signature sig = Signature.getInstance(sigAlg.getAlgorithm().getId(), local 233 sig.initSign(priv_key, rand); 237 sig.initSign(priv_key); 247 sig.update(new DERSequence(pkac).getEncoded(ASN1Encoding.DER)); 254 sigBits = sig.sign();
|
/external/mockito/cglib-and-asm/src/org/mockito/cglib/proxy/ |
MethodInterceptorGenerator.java | 88 Signature sig = method.getSignature(); local 94 sigMap.put(sig.toString(), methodProxyField); 118 if (sig.getArgumentTypes().length == 0) { 126 e.unbox_or_zero(sig.getReturnType()); 180 Signature sig = method.getSignature(); local 183 e.push(sig.getName()); 187 e.push(sig.getDescriptor()); 199 Signature sig = method.getSignature(); local 208 e.push(sig.getDescriptor()); 209 e.push(sig.getName()) [all...] |
/cts/tools/signature-tools/src/signature/io/impl/ |
BinaryApi.java | 52 return api.getName().replaceAll(" ", "_").concat(".sig");
70 IApi sig = null;
local 72 sig = (IApi) ois.readObject();
77 sig.setName(name);
81 return sig;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/serialization/ |
SignedObjectTest.java | 44 private Signature sig; field in class:SignedObjectTest 50 sig = Signature.getInstance("SHA1withDSA"); 63 o = new SignedObject(prop, tkp.getPrivate(), sig); 90 if (!test.verify(tkp.getPublic(), sig)) {
|